University of the Cumberlands Mobile and Cloud Computing Security Paper

User Generated

Arznyv

Writing

University of the Cumberlands

Description

Project, Paper and Presentation

You will used the below data sets in the course project. You may want to select a team of 2-3 (or you can work individually if you want) and select the data set you wish to work on. Write a Paper and a Presentation

To explore the data and know more about it, click the link below:

https://sites.google.com/respec.com/smartsa-datath...

OR, data.gov: I highly recommended you select a problem from here and work on it:

https://www.data.gov/

RECOMMENDED but not required : CHOOSE TWO DATA SETS.

You need to write a detailed paper about your project findings. The following subtitles should be included (but not limited to)

Abstract

Introduction about the topic

Related work/Literature Review/ from books/articles/websites

Problem definition and Data set description/information about the data set.

Approach: The predictive models selection/feature extraction..etc, (at least 3 models such as linear regression, decision tree, SVM (all types)

Experimental Results: Models evaluation and interpretation (such as your own data flow diagrams, figures, tables if applicable).

Conclusion

References and citations in the text

The paper should follow the IEEE conference template (at least 18 pages).

Note: You need to write the code also send me the code separate format). The project is separate document please follow the APA guidelines.



Explanation & Answer:
5 pages
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello✋

Running head: MOBILE AND CLOUD COMPUTING SECURITY

Mobile and Cloud Computing Security
Student Name
Institution Affiliation
Date

MOBILE AND CLOUD COMPUTING SECURITY

2

Mobile and Cloud Computing Security
Abstract
The technological wonders that people have been reading about the various literature relating to
science-fiction are today coming into reality. Drawing from 3D-holograms, cells phones, robots,
artificial intelligence among other novelties devices of modern engineering, human beings are
today enable to perform many tasks including those which were seemed to be impossible about
twenty years ago. Wearable computing technology has evolved with time and it includes invention
and designing of devices that uses computational miniature body-borne and some contain sensory
devices. These devices are basically worn over, under or in the human clothes and they help in
performing specific functions of human beings. The devices have extended its functions to people
with disabilities including viewing aid for blind people and for people with memory problems.

Wearable computing device today is among the necessary part in regards to daily life in
the majority of people living in the United States as well as various parts of the world, especially
in the most developed countries. However, some of these technology interactions have been
assumed to have negative impacts on normal human lives. As such, there have been health-based
organizations that have pushed the motion against such technology innovations hence leading to
their decline. For example, some of wearable computing devices have been discovered to cause
some harmful diseases to people such as skin cancer. Also, the technology has made people to
become lazy hence affecting the physical structure of their bodies. Another disadvantage that has
emerged as a result of these rapid growths in wearable computing technology is that they are
considered to be less versatile. In essence, they cannot take on heavy functions like that of a

MOBILE AND CLOUD COMPUTING SECURITY

3

personal computer or a mobile phone. Also, they are recognized as the most expensive devices in
regards to technology today therefore only limited to few people.

Introduction
Organizations have been facing challenges which the incident handlers are challenged with in
identifying incidents when resources have been moved out to a cloud environment. Incident
handlers are those people who manage and control security incidents through identification and
understanding the specific techniques to respond to such attacks when they occur. Therefore, this
paper discusses the challenges which incident handlers face during identification of incidents in
the cases when resources in the firm have been transferred to cloud surroundings.
When the resources in a company are moved to a cloud environment, it means that the company
has transferred its funds to a web-based applications rather than using storage software in
computers. Firstly, the same resources which have been moved to cloud environment become
shared to many and different users. Secondly, people face also gets knowledge about the
company’s resources for free and then they don’t pay for them is a great challenge to the incident
handlers. Moreover, things become very complicated because the resources are shared between
many users.
With the cloud computing environment, the incident handlers face challenges for having
knowledge and basics about this kind of computing. However, the incident handlers have to have
a lot of knowledge about the infrastructure and configurations of the cloud. The incident handles
also face the challenges of specific security parameters met in cloud services (Grispos. Intel. 2019).

MOBILE AND CLOUD COMPUTING SECURITY

4

Many technologies are used in cloud computing such as databases, and therefore, these
technologies have many security issues.
In conclusion, incident handlers are those people who manage and control the security incidents
through identification and understanding of the specific techniques to respond to such attacks when
they occur. As discussed above, there are challenges that face organizations such as many
technologies with security issues after moving their resources to a cloud environment.
Cloud computing has emerged as one of the most prominent services for data storage.
Cloud computing saves money and time because data are stored in multiple virtual servers.
Therefore, users are saved from paying maintenance and license fees, hardware and software.
Cloud computing also provides high agility and scalability since cloud users access to cloud
systems directly. Maintaining data integrity in cloud computing, however, is difficult because they
do not have control over their outsourced data. According to Kumar & Rao (2014), “Integrity is
an extent of confidence that what information is available in the cloud, what is actually there, and
is protected against accidental or intentional alteration without authorization.” Cloud users depend
on trusted third-parties to protect and maintain their outsourced.
Data integrity is an important part of cloud data storage. Several institutions and
organizations today store their data in cloud-based systems. Some of the popular cloud computing
systems include “such as SaaS, PaaS, and IaaS and deployment models like Private, Public, and
Hybrid” (Kumar & Rao, 2014). These cloud systems are vulnerable to hacking and other activities
that jeopardize the integrity of data. Cloud data loses its integrity when accessed by unauthorized
third parties causing alteration, modification, misuse, and defacement. Digital storage of data
requires a service provider to practice utmost honesty and integrity to ensure that data is stored
safely. The concept of data integrity also involves reliability, confidentiality, and availability of

MOBILE AND CLOUD COMPUTING SECURITY

5

data during retrieval. Cloud service providers employ different methods including hashing to
maintain data integrity.
The hash algorithm is one of the effective methods of maintaining data integrity in cloud
computing. The hash algorithm is a technique that can be applied in cloud computing to provide
integrity of the outsourced data. Hashing maintains data integrity by converting key values into a
range of indexes of an array. Basically a hash is calculated and send to a receiver such that if
someone alters or modifies the data, the receiver will able to detect since there will different hash
value. Hashing enhances flexibility, integrity and reduces the latency of data (Harfoushi &
Obiedat, 2018). The most common hashing functions include MD5, CRC, and SHA-1. According
to Rasjid et al. (2017), the most effective hashing function is MD 5. Hashing function helps in
transforming data of arbitrary size onto data of a fixed size.
In addition, vital information that I learned from this project is that hashing collision occurs
when there are several pairs of distinct keys. A hash collision occurs when the hash function is not
perfect. According to Rasjid et al. (2017), a collision occurs when the data is much larger than the
fixed hash values. Collision interferes with the integrity of data because it causes the hash function
to fail to return the correct nodes and values. Collision can be strong or weak. A good hash
function should be able to avoid collisions. There are different hashing methods for resolving hash
collision. These include double hashing method, quadratic probing, linear probing, and cuckoo
hashing methods. Other hashing methods include middle-square hashing method, multiplication
hashing method, and Fibonacci hashing method.

MOBILE AND CLOUD COMPUTING SECURITY

6

Related Work/ Literature Review
Internet economy can be described as a general term for all the economic transactions
executed over the internet. It is also referred to as a web economy or digital economy. However,
the internet economy describes an economy dependent on or supporting the existence of digital
and computing technologies, including all economic, business, cultural, and social activities
sponsored by the internet and other digital communication technologies. The presence of the
internet has enabled the shift in these activities from the physical to the virtual alignment. While
industries depend on several factors to produce, distribute products and services to consumers in
different parts of the world, this paper seeks to explore how the internet economy promotes these
industr...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags